Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 200 (0.048 secs)
You searched for: subject:"defcon"
[1] 2 3 4     Next    Last
[audio]Defcon
How Close
Keywords: Defcon
Downloads: 46
[movies]PoS Attacking the Traveling Salesman - Alex Zacharis & Tsagkarakis Nikolaos
Our work presents a re-vamped Point-of-Sales (POS) attack targeting the transportation sector and focusing mainly on the international aviation industry. Through a real-life attack and while exposing serious security issues at an International Airport, we are re-introducing the popular PoS attack, focusing on the compromise of sensitive personal data such as travelers' identities and trip information...
Keywords: defcon22; defcon; hackercons
[movies]The $env - PATH less Traveled is Full of Easy Privilege Escalation Vulns - Christopher Campbell

Keywords: defcon22; defcon; hackercons
[movies]Ephemeral Communications - Why and How - Panel

Keywords: defcon22; defcon; hackercons
[movies]Masquerade - How a Helpful Man-in-the-Middle Can Help You Evade Monitoring - Ryan Lackey & Marc Rogers & theGrugq

Keywords: defcon22; defcon; hackercons
[movies]You're Leaking Trade Secrets - Michael Schrenk
Networks don't need to be hacked for information to be compromised. This is particularly true for organizations that are trying to keep trade secrets. While we hear a lot about personal privacy, little is said in regard to organizational privacy. Organizations, in fact, leak information at a much greater rate than individuals, and usually do so with little fanfare. There are greater consequences for organizations when information is leaked because the secrets often fall into the hands of competi...
Keywords: defcon22; defcon; hackercons
Downloads: 4
[movies]The Internet of Fails - Where IoT Has Gone Wrong and How We're Making It Right - Mark Stanislav & Zach Lanier

Keywords: defcon22; defcon; hackercons
[movies]Saving Cyberspace by Reinventing File Sharing - Eijah

Keywords: defcon22; defcon; hackercons
[movies]Empowering Hackers to Create a Positive Impact - Keren (k3r3n3) Elazari
In March 2014 I spoke at the annual TED conference about why hackers are a vital part of the information age. I claimed that the world actually needs hackers, and that they play an important social, political and technology role. At first I thought I will encounter objection, but I found out I was preaching to the choir. Surprisingly, many of the smart, powerful, rich people at TED thought hackers were just great...
Keywords: defcon22; defcon; hackercons
[movies]Advanced Red Teaming - All Your Badges Are Belong To Us - Eric Smith & Josh Perrymon

Keywords: defcon22; defcon; hackercons
[movies]Raspberry MoCA - A recipe for compromise - Andrew Hunt

Keywords: defcon22; defcon; hackercons
[movies]Practical Aerial Hacking & Surveillance - Glenn Wilkinson
The coupling of unmanned aerial vehicles (UAVs) with hacking & surveillance devices presents a novel way to track and profile individuals, as well as attack infrastructure. Whilst there have been numerous stories of stunt-hacking (attaching any existing hack to a flying toy) our research aimed to be practical and add use beyond the capability of ground based units. In this talk we will discuss how people are already and unwittingly being tracked and surveilled by private, law enforcement, and mi...
Keywords: defcon22; defcon; hackercons
[movies]Domain Name Problems and Solutions - Paul Vixie
Spammers can't use dotted quads or any other literal IP address, since SpamAssassin won't let it through, since it looks too much like spam. So, spammers need cheap and plentiful -- dare we say 'too cheap to meter'? -- domain names. The DNS industry is only too happy to provide these domain names, cheaply and at massive scale. The end result is that 90% of all domain names are crap, with more on the way...
Keywords: defcon22; defcon; hackercons
[movies]Getting Intimate with Kevin Mitnick - Kevin Mitnick

Keywords: defcon22; defcon; hackercons
Downloads: 4
[movies]Hacking US (and UK & Australia & France etc.) traffic control systems - Cesar Cerrudo

Keywords: defcon22; defcon; hackercons
[movies]Ting Chua - Stolen Data Markets An Economic and Organizational Assessment - Dr. Thomas Holt & Olga Smirnova & Yi

Keywords: defcon22; defcon; hackercons
[movies]DEF CON the Mystery and Myth and Legend - Panel

Keywords: defcon22; defcon; hackercons
[movies]Generating ROP payloads from numbers - Alexandre Moneger
Is it possible to generate a ROP payload whilst using as few gadgets from the target binary as possible? Is it also possible to build any shellcode in memory regardless of the opcodes in the target binary? An approach to this is to build the ROP payload by summing selected pieces of memory together and copying them to a stack in the process address space. A method and tool will be presented, which allows to stitch together selected numbers found in memory into a payload and execute it...
Keywords: defcon22; defcon; hackercons
[movies]Is This Your Pipe.. Hijacking the Build Pipeline - Kyle Kelley & Greg Anderson

Keywords: defcon22; defcon; hackercons
[movies]Contests Awards Ceremony - Panel

Keywords: defcon22; defcon; hackercons
Downloads: 1
[movies]Secure Random by Default - Dan Kaminsky

Keywords: defcon22; defcon; hackercons
Downloads: 4
[movies]Weaponizing Your Pets - The War Kitteh and the Denial of Service Dog - Gene Bransfield
WarKitteh: In my job I have to deliver frequent Information Security briefings to both technical and non-technical professionals. I noticed that as the material got more technical, I began to lose the non-technical crowd. Therefore, I started including humorous pictures of cats and made the briefings include stories about those cats. This worked, and I soon became notorious for my presentation style...
Keywords: defcon22; defcon; hackercons
Downloads: 11
[movies]Secure Because Math - A Deep Dive On Machine Learning - Based Monitoring - Alex Pinto
We could all have predicted this with our magical Big Data analytics platforms, but it seems that Machine Learning is the new hotness in Information Security. A great number of startups with ‘cy’ and ‘threat’ in their names that claim that their product will defend or detect more effectively than their neighbour's product "because math". And it should be easy to fool people without a PhD or two that math just works...
Keywords: defcon22; defcon; hackercons
Downloads: 1
[movies]Saving the Internet (for the Future) - Jay Healey
Saving the Internet (for the Future): Last year, the Dark Tangent wrote in the DC XXI program that the "balance has swung radically in favor of the offense, and defense seems futile." It has always been easier to attack than to defend on the Internet, even back to 1979 when it was written that "few if any security controls can stop a dedicated" red team. We all accept this as true but the community rarely ever looks at the longer term implications of what happens to the internet if one side has ...
Keywords: defcon22; defcon; hackercons
Downloads: 1
[movies]Investigating PowerShell Attacks - Ryan Kazanciyan & Matt Hastings
Over the past two years, we've seen targeted attackers increasingly utilize PowerShell to conduct command-and-control in compromised Windows environments. If your organization is running Windows 7 or Server 2008 R2, you've got PowerShell 2.0 installed (and on Server 2012, remoting is enabled by default!). This has created a whole new playground of attack techniques for intruders that have already popped a few admin accounts (or an entire domain)...
Keywords: defcon22; defcon; hackercons
Downloads: 1
[movies]I Hunt TR - 069 Admins - Pwning ISPs Like a Boss - Shahar Tal

Keywords: defcon22; defcon; hackercons
Downloads: 1
[movies]What the Watchers See - Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil) - Dustin Hoffman & Thomas (TK) Kinsey
Municipalities across the nation are deploying IP-based 802.11 wireless mesh networks for city-wide services, including cameras and microphones for police monitoring, and remote audio broadcasting. Once deployed, the standards-based nature of these networks make it easy for cash-strapped cities to use them for all manner of other IP-based services too. In this presentation we examine a deployed and operational municipal mesh network designed by LeverageIS using Firetide hardware and Firetide's p...
Keywords: defcon22; defcon; hackercons
Downloads: 2
[movies]Manna from Heaven - Improving the state of wireless rogue AP attacks - Dominic White & Ian de Villiers
The current state of theoretical attacks against wireless networks should allow this wireless world to be fully subverted for all but some edge cases. Devices can be fooled into connecting to spoofed networks, authentication to wireless networks can either be cracked or intercepted, and our ability to capture credentials at a network level has long been established. Often, the most significant protection users have are hitting the right button on an error message they rarely understand...
Keywords: defcon22; defcon; hackercons
Downloads: 2
[movies]Bug Bounty Programs Evolution - Nir Valtman
Bug bounty programs have been hyped in the past 3 years, but this concept was actually widely implemented in the past. Nowadays, we can see big companies spending a lot of money on these programs, while understanding that this is the right way to secure software. However, there are lots of black spots in these programs which most of you are not aware of, such as handling with black hat hackers, ability to control the testers, etc...
Keywords: defcon22; defcon; hackercons
[movies]How to Disclose an Exploit Without Getting in Trouble - Jim Denaro & Tod Beardsley
You have identified a vulnerability and may have developed an exploit. What should you do with it? You might consider going to the vendor, blogging about it, or selling it. There are risks in each of these options. This session will cover the risks to security researchers involved in publishing or selling information that details the operation of hacks, exploits, vulnerabilities and other techniques...
Keywords: defcon22; defcon; hackercons
Downloads: 3
[movies]Closing Ceremonies - Panel

Keywords: defcon22; defcon; hackercons
Downloads: 3
[movies]DEF CON 22 Video And Slides - DEFCON
Videos of the DEFCON 22 conference in Las Vegas, NV.
Keywords: defcon; defcon-22; hackercons
Downloads: 14
[movies]Bypass firewalls & application white lists & secure remote desktops under 20 seconds - Zoltan Balazs
In theory, post-exploitation after having remote access is easy. Also in theory, there is no difference between theory and practice. In practice, there is. Imagine a scenario, where you have deployed a malware on a user’s workstation, but the target information is on a secure server accessed via two-factor authentication, with screen access only (e.g. RDP, Citrix, etc.). On top of that, the server runs application white-listing, and only the inbound port to the screen server (e.g...
Keywords: defcon22; defcon; hackercons
Downloads: 4
[movies]NSA Playset - DIY WAGONBED Hardware Implant over I2C - Josh Datko & Teddy Reed
In this talk we present an open source hardware version of the NSA's hardware trojan codenamed WAGONBED. From the leaked NSA ANT catalog, WAGONBED is described as a malicious hardware device that is connected to a server's I2C bus. Other exploits, like IRONCHEF, install a software exploit that exfiltrate data to the WAGONBED device. Once implanted, the WAGONBED device is connected to a GSM module to produce the NSA's dubbed CROSSBEAM attack...
Keywords: defcon22; defcon; hackercons
Downloads: 3
[movies]Getting Windows to Play with Itself - A Hacker's Guide to Windows API Abuse - Brady Bloxham
Windows APIs are often a blackbox with poor documentation, taking input and spewing output with little visibility on what actually happens in the background. By analyzing (and abusing) the underlying functionality of these seemingly benign APIs, we can effectively manipulate Windows into performing stealthy custom attacks bypassing the latest in protective defenses. In this talk, we’ll get Windows to play with itself nonstop while revealing 0day persistence, previously unknown DLL injection te...
Keywords: defcon22; defcon; hackercons
Downloads: 2
[movies]Steganography in Commonly Used HF Radio Protocols - Paul Drapeau & Brent Dukes
Imagine having the capability to covertly send messages to an individual or a larger audience, without the need for large centralized infrastructure where your message could be observed, intercepted, or tampered with by oppressive governments or other third parties. We will discuss the opportunities and challenges with steganography implementations in widely used amateur radio digital modes, and present a proof of concept implementation of hiding messages within innocuous transmissions using the...
Keywords: defcon22; defcon; hackercons
[movies]Playing with Car Firmware or How to Brick your Car - Paul Such 0x222 & Agix
A lot of papers have already been done/produced on hacking cars through ODB2/CanBus. Looking at the car firmware could also be something really fun :) How to access the firmware, hidden menus & functionalities, hardcoded SSID, users and passwords (yes, you read right), are some of the subjects we will cover during this short presentation. Paul Such 0x222 is a security engineer and the founder of SCRT, a Swiss company specialized in ethical hacking / penetration test and digital forensic since 20...
Keywords: defcon22; defcon; hackercons
Downloads: 2
[movies]The Secret Life of Krbtgt - Christopher Campbell
A tale of peril and woe, Krbtgt is the domain account that you just can't quit. Quiet and harmless, it has been with your enterprise since you first installed Active Directory. Although disabled, it has witnessed years of poor configurations, remote code execution vulnerabilities and bad administrator passwords. Come hear Krbtgt's story and see why its days should be numbered. If you don't laugh, you'll cry...
Keywords: defcon22; defcon; hackercons
Downloads: 2
[movies]The Cavalry Year(0) & a Path Forward for Public Safety - Joshua Corman & Nicholas J Percoco
At DEF CON 21, The Cavalry was born. In the face of clear & present threats to "Body, Mind & Soul" it was clear: The Cavalry Isn't Coming... it falls to us... the willing & able... and we have to try to have impact. Over the past year, the initiative reduced its focus and increased its momentum. With a focus on public safety & human life we did our best "Collecting, Connecting, Collaborating" to ensure the safer technology dependence in: Medical, Automotive, Home Electronics & Public Infrastruct...
Keywords: defcon22; defcon; hackercons
[movies]DEF CON Comedy Jam Part VII - Is This The One With The Whales - Panel
Weeeeeeeeee're baaaaaack. Bring out your FAIL. It's the most talked about panel at DEF CON! A standing room only event with a wait list at the door. Nothing is sacred, not the industry, not the audience, not even each other. Last year we raised over $2000 for the EFF and over $5000 over the last 5 years, let's see how much we can raise this year.... David Mortman is the Chief Security Architect and Distinguished Engineer at Dell Enstratius and is a Contributing Analyst at Securosis...
Keywords: defcon22; defcon; hackercons
Downloads: 2
[movies]Detecting and Defending Against a Surveillance State - Robert Rowley
This talk is based on semi-recent reported leaks that detail how state-actors could be engaging in surveillance against people they deem as 'threats'. I will cover the basics on what was leaked, and focus the talk on how to detect hardware bugs, implanted radio transceivers, firmware injections, cellular network monitoring, etc... No need to bring your tin-foil hats though, the discussion here is a pragmatical approach to how to detect such threats and identify if you have been targeted...
Keywords: defcon22; defcon; hackercons
[movies]I am a legend - Hacking Hearthstone with machine learning - Elie Bursztein & Celine Bursztein
Want to become a legend at Hearthstone -- Blizzard's new blockbuster collecting card game -- or simply learn how to play better? Then pull up a chair by the hearth and join us for a talk about Hearthstone mechanics and how to improve your chance of winning using machine learning and data mining. This talk is packed with examples that show how to use the tools that we are releasing at Defcon. First, we will show you how to uncover the most undervalued cards by building a pricing model reflecting ...
Keywords: defcon22; defcon; hackercons
Downloads: 2
[movies]Girl Fault Interrupted - Maggie Jauregui

Keywords: defcon22; defcon; hackercons
Downloads: 14
[movies]Abusing Software Defined Networks - Gregory Pickett
Software Defined Networking (SDN) transfers all forwarding decisions to a single controller and provides the network with the same degree of control and flexibility as the cloud. And with all the major vendors onboard, it will soon be supporting networks everywhere. But current implementations are full of weaknesses that could easily turn this utopian dream of the future into a nightmare and leave networks world-wide exposed...
Keywords: defcon22; defcon; hackercons
Downloads: 3
[movies]What Your Body Tells Me - Body Language for the SE - Chris Hadnagy

Keywords: defcon22; defcon; hackercons
Downloads: 3
[movies]VoIP Wars - Attack of the Cisco Phones - Fatih Ozavci
Many hosted VoIP service providers are using Cisco hosted collaboration suite and Cisco VoIP solutions. These Cisco hosted VoIP implementations are very similar; they have Cisco Unified Communication services, SIP protocol for IP Phones of tenants, common conference solutions, Skinny protocol for compliance, generic RTP implementation, VOSS Solutions product family for management services for tenants...
Keywords: defcon22; defcon; hackercons
Downloads: 3
[movies]Don't Fuck it Up! - Zoz
Online antics used to be all about the lulz; now they're all about the pervasive surveillance. Whether you're the director of a TLA just trying to make a booty call or an internet entrepreneur struggling to make your marketplace transactions as smooth as silk, getting up to any kind of mischief involving electronic communications now increasingly means going up against a nation-state adversary. And if even the people who most should know better keep fucking it up, what does that mean for the res...
Keywords: defcon22; defcon; hackercons
Downloads: 12
[movies]Detecting Bluetooth Surveillance Systems - Grant Bugher
Departments of Transportation around the United States have deployed "little white boxes" -- Bluetooth detectors used to monitor traffic speeds and activity. While they're supposedly anonymous, they detect a nearly-unique ID from every car, phone, and PC that passes by. In this presentation, I explore the documentation on these surveillance systems and their capabilities, then build a Bluetooth detector, analyzer, and spoofer with less than $200 of open-source hardware and software...
Keywords: defcon22; defcon; hackercons
Downloads: 3
[movies]Welcome & Making of the DEF CON Badge - Dark Tangent & LosT

Keywords: defcon22; defcon; hackercons
Downloads: 3
[movies]Attacking the Internet of Things using Time - Paul McMillan
Internet of Things devices are often slow and resource constrained. This makes them the perfect target for network-based timing attacks, which allow an attacker to brute-force credentials one character at a time, rather than guessing the entire string at once. We will discuss how timing attacks work, how to optimize them, and how to handle the many factors which can prevent successful exploitation...
Keywords: defcon22; defcon; hackercons
Downloads: 3
[1] 2 3 4     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Related mediatypes

movies
audio

Terms of Use (10 Mar 2001)